Secure session keys context

a session key and context technology, applied in the field of secure wireless communications, to achieve the effect of faster and more efficient handoffs

Inactive Publication Date: 2007-03-15
WSOU INVESTMENTS LLC
View PDF25 Cites 141 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0032] An object of the present invention is to provide faster, more efficient handoffs with situations that re...

Problems solved by technology

The problem is how to create the session...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure session keys context
  • Secure session keys context
  • Secure session keys context

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

IV. Session Keys Context

[0067] Context transfer is a mechanism to transfer MN specific session data from one node to another. The context transfer requires a protocol, for example the Context Transfer Protocol (CTP) [14], currently being defined in the IETF. It is designed to be used between Access Routers during handoffs [3]. Session context could contain for example header compression state, QoS settings, filtering rules, and an accounting counter, etc. IEEE has also defined a signaling protocol between Access Points [9]. WiMAX Forum is also specifying a protocol between Base Stations (=APs). An assumption in this specification is that context transfers are possible between Access Points either by using IETF CTP, IEEE 802.11F or something else. The assumption is that a context gets transferred from an old AP to a new AP in one or more packets. This can happen either proactively (old AP pushes the context to the new AP) or reactively (new AP pulls the context from the old AP) depen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Handoffs must be fast for wireless mobile nodes without sacrificing the security between a mobile node and wireless access points in an access network. A secure session keys context approach is shown having all the good features, like mobility and security optimization, of the currently existing proposals of key-request, pre-authentication, and pre-distribution but also providing improved scalability for the access network and for the mobile node. The new approach is compared to the existing proposals including memory requirements and especially how to reduce memory usage using a “just-in-time” transfer of security information between access points and a mobile node during a handover.

Description

CROSS REFERENCE TO RELATED APPLICATION [0001] This application claims priority from U.S. provisional application Ser. No. 60 / 697,270 filed Jul. 6, 2005.BACKGROUND OF THE INVENTION [0002] 1. Technical Field [0003] The present invention relates to secure wireless communications and, more particularly, to preserving security of a wireless communication during handover. [0004] 2. Discussion of Related Art I. Introduction [0005] Protected Session Keys (SK) management for mobile terminals attached to wireless access networks has become a hot research topic. The term “Session Keys” (SKs) refers to keys that are used to create ciphering keys between an Access Point (AP) and a Mobile Node (MN). This SK could also be named as an Authentication Key (AK). In IEEE groups such as 802.11(r,i)[17], 802.21, and 802.16 (WiMAX) are working with issues to improve support for mobile terminals without sacrificing the security of Mobile Node sessions. The so-called Extensible Authentication Protocol (EAP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/20H04W12/02H04W12/06H04W36/02H04W36/08
CPCH04L63/061H04L2463/061H04W12/04H04L2209/80H04L9/083H04L9/0844H04W36/0038H04W12/73
Inventor FORSBERG, DAN
Owner WSOU INVESTMENTS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products